Sentinel-One / sack-cve-fixerLinks
SentinelOne's SACK CVE Fixer
☆22Updated 6 years ago
Alternatives and similar repositories for sack-cve-fixer
Users that are interested in sack-cve-fixer are comparing it to the libraries listed below
Sorting:
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆35Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 6 months ago
- No-Script Automation Tool☆56Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Packet communication investigator☆91Updated 2 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- ☆25Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- ☆13Updated 6 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 3 months ago
- Cybersecurity Incidents Mind Maps☆33Updated 4 years ago